ChaptersEventsBlog
We're exploring how organizations adapt IAM to AI. Take the AI Identity and Risk Readiness Survey by September 5 →

Announcements

Announcements
NIST Special Publication (SP) 800-207, Zero Trust Architecture
NIST Special Publication (SP) 800-207, Zero Trust Architecture

March 8, 2022

Nonprofit Cyber launches with mission to increase cybersecurity awareness
Nonprofit Cyber launches with mission to increase cybersecurity awareness

Security Magazine

March 4, 2022

5 Ways to Determine If You Do Cybersecurity or Cybersecurity Theater
5 Ways to Determine If You Do Cybersecurity or Cybersecurity Theater

Security Boulevard

March 2, 2022

Cloud security is too important to leave to cloud providers
Cloud security is too important to leave to cloud providers

ZDNet

February 28, 2022

Cybersecurity NPOs Form ‘Nonprofit Cyber’ Coalition
Cybersecurity NPOs Form ‘Nonprofit Cyber’ Coalition

The Nonprofit Times

February 28, 2022

Responsible AI Deployment in Healthcare Requires Collaboration
Responsible AI Deployment in Healthcare Requires Collaboration

Health IT Analytics

February 24, 2022

Nonprofits, Activate! Orgs Team Up to Tackle Cybersecurity Threats
Nonprofits, Activate! Orgs Team Up to Tackle Cybersecurity Threats

PC Magazine

February 24, 2022

Nearly two dozen nonprofits form new coalition to collaborate, amplify good cyber advice
Nearly two dozen nonprofits form new coalition to collaborate, amplify good cyber advice

SC Magazine

February 23, 2022

AI in Healthcare Presents Need for Security, Privacy Standards
AI in Healthcare Presents Need for Security, Privacy Standards

Health IT Security

February 17, 2022

Cloud Security Alliance publishes guidelines to bridge compliance and DevOps
Cloud Security Alliance publishes guidelines to bridge compliance and DevOps

Computer Weekly

February 16, 2022

New Cloud Security Alliance Report Highlights Factors to Consider When Designing Blockchain Solutions That Operate Within Critical Sectors
New Cloud Security Alliance Report Highlights Factors to Consider When Designing Blockchain Solutions That Operate Within Critical Sectors

Crypto Reporter

February 16, 2022

Cloud Security Alliance Publishes Report on Blockchain Risk, Security Considerations
Cloud Security Alliance Publishes Report on Blockchain Risk, Security Considerations

Crowdfund Insider

February 16, 2022

By Looking at the Past, New Cyber Board Can Prepare Us for the Future
By Looking at the Past, New Cyber Board Can Prepare Us for the Future

Data Center Knowledge

February 15, 2022

New Guidelines From Cloud Security Alliance and SAFECode Help DevSecOps Teams Translate Security and Compliance Requirements Into the Development Cycle
New Guidelines From Cloud Security Alliance and SAFECode Help DevSecOps Teams Translate Security and Compliance Requirements Into the Development Cycle

StreetInsider

February 11, 2022

Organizations and the cloud: How they use it and how they secure it
Organizations and the cloud: How they use it and how they secure it

HelpNet Security

February 11, 2022

Avoid the Hidden Challenges of Data Migration
Avoid the Hidden Challenges of Data Migration

Datanami

February 8, 2022

New Cloud Security Alliance Survey Finds Uneven Adoption Of Emerging Technologies
New Cloud Security Alliance Survey Finds Uneven Adoption Of Emerging Technologies

AIthority

February 4, 2022

Russia prepares deep fakes? Ransomware disrupts logistical services in Europe. A Chinese APT prospects European governments.
Russia prepares deep fakes? Ransomware disrupts logistical services in Europe. A Chinese APT prospects European governments.

CyberWire

February 4, 2022

New Cloud Security Alliance Survey Finds Uneven Adoption Of Emerging Technologies
New Cloud Security Alliance Survey Finds Uneven Adoption Of Emerging Technologies

AiThority

February 4, 2022

The importance of a policy-driven threat modeling approach
The importance of a policy-driven threat modeling approach

Tech Target

February 3, 2022